Round-robin differential-phase-shift quantum key distribution with a passive decoy state method
暂无分享,去创建一个
Li Liu | Qiao-Yan Wen | Su-Juan Qin | Fen-Zhuo Guo | S. Qin | F. Guo | Q. Wen | Li Liu
[1] XiaoYuan ZhenZhang,et al. Practical round-robin differential-phase-shift quantum key distribution , 2017 .
[2] Kai Wen,et al. Unconditional security of single-photon differential phase shift quantum key distribution. , 2008, Physical review letters.
[3] Hiroki Takesue,et al. Differential-phase-shift quantum key distribution , 2009, 2006 Digest of the LEOS Summer Topical Meetings.
[4] Fei Gao,et al. Finite-key analysis for quantum key distribution with decoy states , 2011, Quantum Inf. Comput..
[5] Shuang Wang,et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring , 2015, Nature Photonics.
[6] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[7] T. Moroder,et al. Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.
[8] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[9] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[10] Yoshihisa Yamamoto,et al. Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.
[11] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[12] Zhu Cao,et al. Experimental passive round-robin differential phase-shift quantum key distribution. , 2015, Physical review letters.
[13] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[14] Andrew J. Shields,et al. Key to the quantum industry , 2007 .
[15] Ting-Ting Song,et al. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources , 2015, Scientific Reports.
[16] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[17] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[18] H. Lo,et al. Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.
[19] Masato Koashi,et al. Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.
[20] Wan-Su Bao,et al. Practical round-robin differential phase-shift quantum key distribution. , 2016, Optics express.
[21] T. Moroder,et al. Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. , 2009, Optics letters.
[22] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[23] C. Silberhorn,et al. Quantum key distribution with passive decoy state selection , 2007 .
[24] Chun-Yan Li,et al. Practical decoy-state measurement-device-independent quantum key distribution , 2013, 1305.7396.
[25] Sellami Ali,et al. DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .
[26] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[27] Masato Koashi,et al. Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.
[28] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[29] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[30] Masato Koashi,et al. Experimental quantum key distribution without monitoring signal disturbance , 2015, Nature Photonics.
[31] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[32] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[33] Wei Chen,et al. Experimental round-robin differential phase-shift quantum key distribution , 2015, 1505.08142.
[34] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[35] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[36] Charles H. Bennett,et al. WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .
[37] Josef Pieprzyk,et al. Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing , 2018, Laser Physics Letters.
[38] Nobuyuki Imoto,et al. Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws , 2015 .
[39] J-C Boileau,et al. Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.
[40] Chun-Yan Li,et al. Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .
[41] Qiaoyan Wen,et al. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .
[42] H. Lo,et al. Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.